Journal Information
Security and Communication Networks (SCN)
Impact Factor:

Call For Papers
Security and Communication Networks is an international journal publishing original research and review papers on all security areas including network security, cryptography, cyber security, etc. The emphasis is on security protocols, approaches and techniques applied to all types of information and communication networks, including wired, wireless and optical transmission platforms.

The journal provides a prestigious forum for the R&D community in academia and industry working at the inter-disciplinary nexus of next generation communications technologies for security implementations in all network layers.

Answering the highly practical and commercial importance of network security R&D, submissions of applications-oriented papers describing case studies and simulations are encouraged as well as research analysis-type papers.

The most recent Impact Factor for Security and Communication Networks is 0.806 according to the 2015 Journal Citation Reports released by Thomson Reuters in 2016.

Content published prior to 2017 is hosted on the Wiley Online Library.

Security and Communication Networks currently has an acceptance rate of 17%. The average time between submission and final decision is 56 days and the average time between acceptance and publication is 44 days. 
Last updated by Xin Yao in 2017-08-21
Special Issues
Special Issue on Network Security and Management in SDN
Submission Date: 2017-09-29

Software Defined Networking (SDN) enables flexible deployment and innovation of new networking applications by decoupling and abstracting the control and data planes. It has radically changed the concept and way that we build, and manage networked systems, and reduced the barriers to entry for new players in the services markets. Recently, SDN has been widely studied and applied to facilitate network management and new network security systems development. However, the separation of control and data planes makes SDN vulnerable to security threats. Attackers can monitor and tamper network management information, disrupt network communication by implementing man-in-the-middle attacks, saturation attacks, denial of service attacks, etc. Therefore, it is important to analyze the vulnerability, improve trust management, and design defense mechanism for securing SDN based systems. Although some important progress has been made in SDN security, there are still many technical challenges. In this special issue, we welcome submissions addressing the underlying technical issues in the area of network security and management in SDN and aim to publish papers presenting recent research results and implementation experiences from both academia and industrial community. Survey papers offering a perspective on related work and identifying promising directions will also be considered. Potential topics include, but are not limited to: -Vulnerability analysis and evaluations in SDN -Network Architecture of securing SDN -Employment experiences of securing SDN -Attack detection and desponse in SDN -Abnormal traffic detection in SDN -Potential solution of securing SDN -Network and flow verification in SDN -Protection and restoration in SDN -Protocol of securing SDN -QoS/QoE of securing SDN -Authentication of securing SDN -Data Plane Protection in SDN -Control Plane Protection in SDN -Test-bed and proof of concept -Trust management in SDN -Measurement in securing SDN
Last updated by Dou Sun in 2017-06-03
Special Issue on Multimedia Security: Novel Steganography and Privacy Preserving
Submission Date: 2017-09-29

With the quick evolution of information technologies, computer networks, and digital imaging technology over the past decades, the modification of media has been greatly leveraged with tools easily available. Meanwhile, the use of media also made sensitive information available to potential eavesdroppers. The credibility of digital media has thus decreased and the demand for new technologies has emerged. Many techniques have been introduced to study their intrinsic principles. Nowadays, many challenges emerge. First, the traditional steganography is now seriously threatened by machine learning based steganalysis. Therefore, new types of steganography, for example, constructive steganography, are urgently needed to combat state-of-the-art steganalysis. Second, when transmitting stego media over social networks, the servers always modify the covers, for example, changing the resolution or recompressing the multimedia. Since the traditional steganography techniques are always fragile, robust steganography is now required. Third, the lack of efficient techniques of privacy preserving is now preventing the development of cloud computing. For example, how to encrypt a JPEG image for cloud storage users and how to reliably solve a complicated computation by outsourcing are still open questions. This special issue focuses on active research areas on multimedia security, such as novel types of steganography, privacy preserving on cloud computing, multimedia tampering detection, and source device identification. We invite the authors to submit original research articles covering theoretical aspects models and solutions to stimulate the development of multimedia security. Potential topics include but are not limited to the following: Latest techniques of steganography and steganalysis Recent developments in multimedia forensics Advances in reversible data hiding in plaintext or ciphertext multimedia Reliable computing and outsourcing of multimedia Novel techniques of multimedia watermarking Privacy preserving of multimedia Authors can submit their manuscripts through the Manuscript Tracking System at Manuscript Due Friday, 29 September 2017 First Round of Reviews Friday, 22 December 2017 Publication Date Friday, 16 February 2018
Last updated by Dou Sun in 2017-04-24
Related Publications